<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Lakera Videos - Breaking Point EP6: “OmniChat Desktop” – When Metadata Becomes the Attack in AI Agents Security</title>
    <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Videos-Breaking-Point-EP6-OmniChat-Desktop-When-Metadata/m-p/261572#M19</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Agentic systems are getting wild and in Episode 6 of Breaking Point, I dive into a real desktop chatbot that uses the Model Context Protocol (MCP)… and show how metadata alone can bend the agent to my will. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This isn’t a jailbreak. It’s worse. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We’re talking indirect prompt injection. Influencing the agent not through what the user says… but through the tools it trusts. MCP promises “superpowers” for agents. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What it really unlocks? A much bigger attack surface. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode I explore OmniChat Desktop, a weather-fetching app powered by third-party MCP servers — where simple tool descriptions look almost indistinguishable from system prompts. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And when an agent can’t tell data from instructions… you already know where this is going. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":warning:"&gt;⚠️&lt;/span&gt; No spoilers, but let’s just say metadata should not be trusted.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FWWejUTnqY24%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DWWejUTnqY24&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FWWejUTnqY24%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="112" scrolling="no" title="Breaking Point EP6: OmniChat Desktop - When Metadata Becomes the Attack" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 31 Oct 2025 11:05:40 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2025-10-31T11:05:40Z</dc:date>
    <item>
      <title>Lakera Videos - Breaking Point EP6: “OmniChat Desktop” – When Metadata Becomes the Attack</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Videos-Breaking-Point-EP6-OmniChat-Desktop-When-Metadata/m-p/261572#M19</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Agentic systems are getting wild and in Episode 6 of Breaking Point, I dive into a real desktop chatbot that uses the Model Context Protocol (MCP)… and show how metadata alone can bend the agent to my will. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This isn’t a jailbreak. It’s worse. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We’re talking indirect prompt injection. Influencing the agent not through what the user says… but through the tools it trusts. MCP promises “superpowers” for agents. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What it really unlocks? A much bigger attack surface. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode I explore OmniChat Desktop, a weather-fetching app powered by third-party MCP servers — where simple tool descriptions look almost indistinguishable from system prompts. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And when an agent can’t tell data from instructions… you already know where this is going. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":warning:"&gt;⚠️&lt;/span&gt; No spoilers, but let’s just say metadata should not be trusted.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FWWejUTnqY24%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DWWejUTnqY24&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FWWejUTnqY24%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="112" scrolling="no" title="Breaking Point EP6: OmniChat Desktop - When Metadata Becomes the Attack" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 11:05:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Videos-Breaking-Point-EP6-OmniChat-Desktop-When-Metadata/m-p/261572#M19</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-10-31T11:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: Lakera Videos - Breaking Point EP6: “OmniChat Desktop” – When Metadata Becomes the Attack</title>
      <link>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Videos-Breaking-Point-EP6-OmniChat-Desktop-When-Metadata/m-p/261574#M20</link>
      <description>&lt;P&gt;Awesome&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 11:37:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/AI-Agents-Security/Lakera-Videos-Breaking-Point-EP6-OmniChat-Desktop-When-Metadata/m-p/261574#M20</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-31T11:37:32Z</dc:date>
    </item>
  </channel>
</rss>

